General

  • Target

    191e1fa80c755544d07fed8949a2b962_JaffaCakes118

  • Size

    301KB

  • Sample

    240628-g81nfsybkj

  • MD5

    191e1fa80c755544d07fed8949a2b962

  • SHA1

    f9aac34463369e856dbd7d04b89adbf13bc88bfd

  • SHA256

    67aaebb921160aec17aa7d48bb77b2519eaf461010b9da9c230266b370aae76f

  • SHA512

    2ba41da2815d21ff30f67f25342a9ce19f4bf276001137e6f55bbb631e54e1f70d79e2be748908c5b962f95a8309bcd503ba660dc676038fb5787d4a296333fc

  • SSDEEP

    6144:Nm9gegaIZT3Ye77MfKjJaV8gyccBdYHEzoI86PEpw0OfFpA9FlYb:igegltYe7IfKjJWyccBqHEzoxw0aVb

Malware Config

Targets

    • Target

      191e1fa80c755544d07fed8949a2b962_JaffaCakes118

    • Size

      301KB

    • MD5

      191e1fa80c755544d07fed8949a2b962

    • SHA1

      f9aac34463369e856dbd7d04b89adbf13bc88bfd

    • SHA256

      67aaebb921160aec17aa7d48bb77b2519eaf461010b9da9c230266b370aae76f

    • SHA512

      2ba41da2815d21ff30f67f25342a9ce19f4bf276001137e6f55bbb631e54e1f70d79e2be748908c5b962f95a8309bcd503ba660dc676038fb5787d4a296333fc

    • SSDEEP

      6144:Nm9gegaIZT3Ye77MfKjJaV8gyccBdYHEzoI86PEpw0OfFpA9FlYb:igegltYe7IfKjJWyccBqHEzoxw0aVb

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Drops file in Drivers directory

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks